1 / 34

Understanding the benefits and the risks.

Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP. BYOD - Bring Your Own Device or Bring Your Own Danger?. The way we were. Hardware, software, and not much more. The way we are. Mobile technology and social m edia have changed everything.

deron
Download Presentation

Understanding the benefits and the risks.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?

  2. The way we were Hardware, software, and not much more.

  3. The way we are Mobile technology and social media have changed everything. Change began in 2007 Business risk increased significantly Social Media encouraged sharing of confidential information

  4. Blurring of the lines The love affair employees have with mobile devices assures that they are here to stay. Work anytime, anywhere.

  5. Do the benefits of BYOD outweigh the risks? More security challenges and less control. 40% of devices are consumer owned 80% of professionals will use 2 or more devices Corporate systems and data are more accessible than ever 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004

  6. ! BYOD Challenges

  7. You can’t protect what you don’t know Understanding and managing risks associated with BYOD. !

  8. !

  9. Risky viruses & malware Mobile devices offer little protection. !

  10. Uninvited guests The risk from hackers and intrusions. Enter workplace via consumer devices Access to other devices and data Potential for company-wide infections !

  11. !

  12. !

  13. Challenges to productivity Adopting & enforcing a BYOD strategy. Younger employees collaborate in new ways Employees want freedom to use mobile devices at work Secure access solutions are necessary for empowering employees to work anywhere !

  14. BYOD Missteps

  15. BYOD missteps 1. Not knowing what devices and applications are being used. Failure to know what employees are doing on the network prevents successful planning

  16. BYOD missteps 2. Not knowing how your social media strategy works with your BYOD policies. Employees accessing social networks and social applications are not always wasting time

  17. BYOD missteps 3. Weak password management. User-generated passwords are often weak and can compromise IT systems passwor

  18. BYOD Strategies

  19. Policy = Simplicity Focusing on policy is the first step. Determine which devices are allowed to access the network Determine which devices you will support

  20. Separate work from fun Make sure employees understand the rules and the risks. Work life and personal life should be kept separate To get network access, employees must agree to acceptable use policies IT should monitor activity

  21. Protect corporate data Limit access using VPN. For high-level protection, limit access to devices that support VPN connectivity and require a secure connection

  22. Controls that go beyond mobile devices Applications should not be ignored. Application control strategies make BYOD policies more secure Decide which applications are acceptable, and which are not Segment networks for additional protection

  23. Consider additional risks Best practices and policy enforcement are essential Are you subject to controls such as HIPAA or PCI DSS? If a device is lost, can you wipe the data? Do employees know what rights they give up when using a mobile device?

  24. BYOD & WatchGuard

  25. Manage BYODwith WatchGuard Easy-to-use security services for IT administrators. WatchGuard makes managing BYOD easy by designing all products with easy-to-use policy tools. Administrators can enforce policies for small businesses or large enterprises

  26. Control the network and the applications WatchGuard products give you control over how devices are used. Easily and quickly set up network segments Maintain compliance and high-security Monitor over 1,800 types of applications

  27. Protect all connected devices from mobile malware. d The network perimeter is the first line of defense. WatchGuard utilizes a “best-in-class” approach, ensuring network connected devices are shielded with an antivirus umbrella.

  28. Safe surfing solution WatchGuard’sWebBlocker protects users in hostile environments. Resides at the gateway Device agnostic Easy for IT to set up

  29. Protect corporate data Limit access using VPN. For high-level protection, limit access to devices that support VPN connectivity and require a secure connection

  30. What’s connected? What’s being used? WatchGuard illuminates trouble spots and potential weaknesses Logging and reporting are one of the most valuable resources that IT can leverage for a BYOD strategy. This insight helps protect resources and address areas of concern

  31. ! Summary

  32. BYOD is here to stay ! A major trend that is changing IT. Will grow in size and scope Presents new challenges and opportunities A BYOD strategy is critical for data security

  33. Thank You

More Related